ICISSP 2015: Information Systems Security and Privacy pp 177-195 | Cite as
Secure Communication in Civil Drones
Abstract
The drone technology is attracting an increasing attention in civil applications. Secure communication is a critical requirement in many scenarios to provide an acceptable level of data confidentiality, integrity, and availability. In this chapter we first present a security analysis of civil drones. Then, a light-weight hardware solution is proposed to assure the confidentiality and integrity of both command data sent by the ground station and payload data transmitted by the drone. Using the developed prototype, finally, we investigate the impact of hardware accelerators on the power consumption of these power-constrained devices. We show that the advantage of hardware as a power-efficient computation platform is not necessarily valid for drones due to the extra hardware weight.
Keywords
Civil drones Security Cryptoengine Speedup Power consumptionReferences
- 1.Quaritsch, M., Stojanovski, E., Bettstetter, C., Friedrich, G., Hellwagner, H., Rinner, B., Hofbaur, M., Shah, M.: Collaborative microdrones: applications and research challenges. In: Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, p. 38. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2008)Google Scholar
- 2.Gancet, J., Hattenberger, G., Alami, R., Lacroix, S.: Task planning and control for a multi-UAV system: architecture and algorithms. In: 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2005, pp. 1017–1022. IEEE (2005)Google Scholar
- 3.How, J., Bethke, B., Frank, A., Dale, D., Vian, J.: Real-time indoor autonomous vehicle test environment. IEEE Control Syst. Mag. 28, 51–64 (2008)MathSciNetCrossRefGoogle Scholar
- 4.Hoffmann, G., Rajnarayan, D., Waslander, S., Dostal, D., Jang, J., Tomlin, C.: The stanford testbed of autonomous rotorcraft for multi agent control (STARMAC). In: The 23rd Digital Avionics Systems Conference, DASC 2004, vol. 2, p. 12-E. IEEE (2004)Google Scholar
- 5.Chiu, C., Lo, C.: Vision-only automatic flight control for small UAVs. IEEE Trans. Veh. Technol. 60, 2425–2437 (2011)CrossRefGoogle Scholar
- 6.Dierks, T., Jagannathan, S.: Output feedback control of a quadrotor UAV using neural networks. IEEE Trans. Neural Netw. 21, 50–66 (2010)CrossRefGoogle Scholar
- 7.Voos, H.: Nonlinear state-dependent riccati equation control of a quadrotor UAV. In: 2006 IEEE International Conference on Control Applications Computer Aided Control System Design, 2006 IEEE International Symposium on Intelligent Control, pp. 2547–2552. IEEE (2006)Google Scholar
- 8.Minguez, J., Montano, L.: Nearness diagram (ND) navigation: collision avoidance in troublesome scenarios. IEEE Trans. Robot. Autom. 20, 45–59 (2004)CrossRefGoogle Scholar
- 9.Yuan, C., Recktenwald, F., Mallot, H.: Visual steering of UAV in unknown environments. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2009, pp. 3906–3911. IEEE (2009)Google Scholar
- 10.Zsedrovits, T., Zarandy, A., Vanek, B., Peni, T., Bokor, J., Roska, T.: Collision avoidance for UAV using visual detection. In: 2011 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2173–2176. IEEE (2011)Google Scholar
- 11.Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. Infotech@ Aerospace (2012)Google Scholar
- 12.Shepard, D.P., Bhatti, J.A., Humphreys, T.E., Fansler, A.A.: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Proceedings of the ION GNSS Meeting, vol. 3 (2012)Google Scholar
- 13.Pelechrinis, K., Iliofotou, M., Krishnamurthy, V.: Denial of service attacks in wireless networks: the case of jammers. Commun. Surv. Tutorials 13, 245–257 (2011). IEEECrossRefGoogle Scholar
- 14.Bicakci, K., Tavli, B.: Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput. Stand. Interfaces 31, 931–941 (2009)CrossRefGoogle Scholar
- 15.Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRefGoogle Scholar
- 16.Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall, Boca Raton (2008)MATHGoogle Scholar
- 17.NIST: American national standard for financial institution key management (wholesale) (1985). http://csrc.nist.gov/publications/fips/
- 18.Krepa, M.: Jpeg encoder, project, mkjpeg. http://opencores.org/
- 19.ANG-UAVP: Next generation universal aerial videoplatform. http://ng.uavp.ch/moin/FrontPage
- 20.Mueller, M.: ecalc, on-line calculator for electric driven RC models. http://www.ecalc.ch/
- 21.Mansfield, K., Eveleigh, T., Holzer, T.H., Sarkani, S.: Unmanned aerial vehicle smart device ground control station cyber security threat model. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 722–728. IEEE (2013)Google Scholar
- 22.Joye, M., Neven, G.: Identity-Based Cryptography, vol. 2. IOS Press, Amsterdam (2009)MATHGoogle Scholar